Activesync, TCP/IP and 802.11B Wireless Vulnerabilities of Wince-Based Pdas

Total Page:16

File Type:pdf, Size:1020Kb

Activesync, TCP/IP and 802.11B Wireless Vulnerabilities of Wince-Based Pdas ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-based PDAs Pascal Meunier, Sofie Nystrom, Seny Kamara, Scott Yost, Kyle Alexander, Dan Noland, Jared Crane Center for Education and Research in Information Assurance Security (CERIAS), 1315 Recitation Building, Purdue University, West Lafayette, IN 47907-1315; [email protected] Abstract Whereas normal computers may be locked in a trusted Researching the vulnerabilities and security concerns of area, portables may be carried into unsafe areas, and may WinCE-based Personal Digital Assistants (PDAs) in an also be whisked away by an attacker in a moment of 802.11 wireless environment resulted in identifying distraction or during a break and replaced after installing CAN-2001-{0158 to 0163}. The full understanding and a keylogger or other trojan program. Therefore, we demonstration of some vulnerabilities would have believe that physical attacks on portable devices are required reverse engineering ActiveSync, which was much more likely than against normal computers; in beyond the scope of this research. Moreover, the WinCE particular, we are concerned about the speed of the IP stack demonstrated unstabilities under a number of attacks which may enable “tainting” the portable device. attacks, one of which produced symptoms in hardware. ActiveSync was created to provide file The inaccessibility of the 802.11b standard synchronization capabilities for WinCE-based PDAs. It documentation was a source of delays in the research; provides both network-based and local (USB or serial) however, we created three proof-of-concept applications synchronization capabilities. The impersonation of a host to defeat 802.11b security. One collects valid MAC or PDA, as well as attacks on the host providing the addresses on the network, which defeats MAC-address- service were considered. However, ActiveSync based restrictions. Another builds a code book using specifications are proprietary (closed) and were known-plaintext attacks, and the third decrypts 802.11b unavailable to us. Therefore, we were limited to probing traffic on-the-fly using the code book. the outside of this black box without being able to Keywords:WinCE, WEP, ActiveSync, wireless, security, provide a comprehensive analysis. 802.11b, vulnerability In an 802.11b wireless environment, several measures and features are supposed to provide some measure of security. These are the SSID (Service Set Identifier), 1. Introduction MAC address restriction, and the wireless encryption protocol (WEP). Networks are identified and segregated Personal Digital Assistants (PDAs) may be vulnerable by an SSID. The SSID can be broadcast using “beacon” to accidents during transport or attacks against the frames. So-called “closed” networks do not broadcast services and protocols used. Networked PDAs may be SSIDs, so the users have to know the name of the vulnerable to a number of TCP/IP attacks, especially network. However, finding valid SSIDs is trivial with resource exhaustion attacks due to the limited resources any network sniffer. Therefore, we focused on MAC provided by the PDA. Other attacks against networked address restriction, and the wireless encryption protocol PDAs would include malicious content downloaded (WEP). Our methods of attack have been found directly or through a service such as avantgo.com, hostile independently by other teams and announced first JavaScript, ActiveX and Java. An aspect particular to through unrefereed channels [1, 2], even though we had WinCE-based PDAs is the availability of independently identified those we used before their synchronization services through the ActiveSync announcements. However, we implemented these attacks protocol over a serial link, infrared or over TCP/IP; and found them effective and practical, contrary to claims therefore ActiveSync can also be attacked. The by the 802.11b chairperson [6]. We also found convenience of PDAs is enhanced by wireless access, implementation errors in 802.11b hardware. which makes them vulnerable to attacks against the wireless standard 802.11b. Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’02) 1080-1383/02 $17.00 © 2002 IEEE coded factor after every failed connection attempt. 2. Materials and Methods The brute force program was a Visual Basic script that utilized a function called SendKeys(), which sends The initial testbed comprised 3 Aero 1550 Pocket PC keystrokes through the GUI interface. By sending key devices by Compaq, an Aironet card and 2 base stations strokes to the ActiveSync connection application on the AP340 by Cisco (gifts of Microsoft) as well as two PCs PC, it was possible to establish a connection, try three belonging to CERIAS. One PC ran Windows 2000 and passwords and reconect to try it again. Obviously, served as a synchronization host for the handhelds. anyone who understands the internals of ActiveSync can Another was able to boot in either Windows 2000 or directly brute force the 4 required digits in a fraction of Linux Red Hat 6.2; this PC had a PCMCIA card reader the time by avoiding the GUI entirely. The key to this and was used to sniff wireless traffic and as a source of vulnerability is the trust relationship between the PDA attacks against the synchronization host and the Cisco and the host PC. Because the PDA acts as the base station. It was found that the Aero 1550 devices authentication server, it should not be trusting the client were incapable of powering the Aironet card due to PC and the software running on it. The PDA should be incompatible voltages. We later received two PocketPC controlling the exponential backoff, and not the PC. iPaq devices by Compaq, two Ethernet cards and two more wireless cards (Orinoco WaveLan). The iPaqs b) ActiveSync synchronization over a Network were running WinCE 3.0.9348 (Build 9456). (DoS Attacks CAN-2001-0158, CAN-2001-0159) 3. ActiveSync ActiveSync listens on port 5679 of a host PC for a PDA attempting a network synchronization. If a PDA is a) Synchronization over a serial link synchronized through the cradle, port 5679 is closed. The availability of the network synchronization function The most direct ActiveSync connection may be can be enabled or disabled by the user through an option established by placing the device into a charging cradle in the file menu of the host. which is connected to the serial port of a PC. After the We were able to enact a denial of service (DoS) attack initial connection the user at the PC will be prompted to and remotely close the port by establishing a connection authenticate himself/herself if and only if the device is to it and feeding ActiveSync any line that was longer set to require authentication. Authentication for than seven characters. The port stayed closed until the ActiveSync comes in the form of a 4 decimal digit network synchronization option was locally re-enabled personal identification number (PIN) . Should a PDA be on the desktop machine. Anyone with TCP/IP left briefly unattended, it is possible to try to synchronize connectivity to the PC could shut down the service, it in the cradle of a hostile computer. which is potentially anyone on the internet. If the correct PIN is supplied then the device and the Once open, port 5679 stayed open even if network PC compare the files that are to be synchronized and synchronization was disabled. Another DoS attack was transfer them as necessary. If an incorrect PIN number that as long as a connection to port 5679 was established, is supplied, then an error message is displayed and the even if there were no authentication taking place (no user may guess twice more before the connection is traffic), ActiveSync would not allow any other device to broken. To re-establish a new connection, with three synchronize by network or by cradle. This lasted for more attempts, seemed at first to require removing and about 20 seconds at which point the connection was replacing the PDA in the cradle. However, we closed and became available once again. This could also discovered that the unit does not have to be removed be exploited remotely in order to prevent legitimate users physically from the cradle. The connection can be reset from synchronizing. By simply establishing a connection programatically and three more successive tries are to the port, closing it before the 20 seconds elapsed and granted. then re-establishing it again, we could keep the port We were successful in making a proof-of-concept continuously busy, thus making ActiveSync refuse all (unoptimized and slow) brute force attack in the cradle other synchronization requests. by resetting the connection every three password If the protocol specifications and the code had been attempts. We communicated our findings to Microsoft available to us, we would have been able to assess and suggested that an exponential delay be implemented, whether the vulnerabilities were protocol flaws or which would deny for a while new connection attempts implementation problems. to the PDA. The delay would be increased by a hard Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’02) 1080-1383/02 $17.00 © 2002 IEEE 4. TCP/IP Vulnerabilities necessary to free the allocated memory. 5)No effect: No visible effects were found after a) Random IP packets and DoS attacks running ISIC. However, the effects were highly unreproducible, even In order to test the WinCE IP stack, we used a tool after resending the same sequence of packets, or a subset. named ISIC [4] that generates random IP packets. ISIC The longer we would try to test the iPaq (not necessarily is a suite of utilities to exercise the stability of an IP time but attempts), the less frequently we would observe Stack and its component stacks (TCP, UDP, ICMP et. problems. After much testing and grief, we found that al.).
Recommended publications
  • Ios: Setting up Exchange Activesync
    4/29/13 iOS: Setting up Exchange ActiveSync iOS: Setting up Exchange ActiveSync Summary This article explains how to setup an Exchange ActiveSync account on your iPhone, iPad or iPod touch. Contact your Exchange Server administrator if you are unsure of any of the required information. Products Affected iPad, iPhone, iPod touch Follow these steps to setup your Exchange ActiveSync account your iOS device: 1. Tap Settings > Mail, Contacts, Calendars > Add Account > Microsoft Exchange. 2. Enter the information in the fields below, then hit Next: 3. Email: [email protected] 4. Domain: cybersharks0 5. Username: your email address 6. Password: Your email password support.apple.com/kb/ht2480 1/4 4/29/13 iOS: Setting up Exchange ActiveSync 7. Your iOS device will now try to locate your Exchange Server. If necessary, you will need to enter your front-end Exchange Server's complete address in the Server field. 1. Server: e1.cybersharks.com support.apple.com/kb/ht2480 2/4 4/29/13 iOS: Setting up Exchange ActiveSync 8. Choose which content you would like to synchronize: Mail, Contacts, and Calendars. Tap Save when finished. support.apple.com/kb/ht2480 3/4 4/29/13 iOS: Setting up Exchange ActiveSync Note: To modify your exchange settings, Tap Settings > Mail, Contacts, Calendars, select your Exchange account, and tap Account Info. Additional Information For additional Exchange resources, please visit the iPhone Enterprise Support Page or Exchange ActiveSync and iOS Devices in the Apple Help Library. Important: Information about products not manufactured by Apple is provided for information purposes only and does not constitute Apple’s recommendation or endorsement.
    [Show full text]
  • Setup – Activesync / Introduction-Overview | Page 3 of 16
    Setup Guide-Mobility ActiveSync – Hosted Exchange Configuration Document Revision: November 2011 ARS Admin Guide / Table of Contents | Page 2 of 16 Mobility Setup – ActiveSync / Introduction-Overview | Page 3 of 16 Setup Instruction for Mobile Device Connection to Exchange – ActiveSync ActiveSync (aka Windows Mobile) is the wireless service built into Exchange for communicating with ―Smart Phones.‖ Initially, this pertained primarily to mobile devices with the Windows Mobile 5 or 6 operating system in the early 2000s. However, the Smart Phone category has evolved greatly in the last several year, and now includes such mobile operating systems as iOS (Apple’s mobile platform for iPhones, iPod Touch and iPad), Google’s Android OS (which is licensed to several different handset manufacturers), WebOS (which runs on HP/Palm Pre and Pixi devices, and possibly on future HP mobile devices as well), current Windows Mobile 6.5 and future Windows Phone 7 phones, and several other devices that license ActiveSync from Microsoft in order to provide wireless communication to the Exchange enterprise platform, which is ubiquitous in the business community. Smart Phones with an operating system of Windows Mobile 6, or later typically synch email, contacts, calendar, and tasks with an Exchange mailbox. The features associated with ActiveSync enabled phones may differ depending upon the phone device itself or the nature of the licensing agreement for utilizing ActiveSync. General Settings for ActiveSync Because of the popularity of Exchange, mobile ActiveSync
    [Show full text]
  • User Guide Mobile Device Setup
    USER GUIDE MOBILE DEVICE SETUP Merit Network, Inc. 1000 Oakbrook Drive, Suite 200, Ann Arbor, Michigan 48104-6794 Phone: (734) 527-5700 Fax: (734) 527-5790 E-mail: [email protected] TABLE OF CONTENTS - MERITMAIL, MOBILE DEVICE SETUP MeritMail Mobile Overview 3 Configuring a Windows Mobile 5 device 4 Configuring a Windows Mobile 6 device 5 Resetting your device 5-6 Why is a full resync necessary Performing a full resync Windows Mobile Palm devices (Versamail) Nokia symbian devices Other devices Setup for specific devices 7-13 Motorola Q Phone Nokia E51 Nokia E61 Nokia E62 Nokia E65 Nokia E90 Palm Treo 650 Palm Treo 680 Palm Treo 700w Palm TX Sony Ericsson P910i Sony Ericsson P990i Cingular 8525 Qtek A9100 Limitations 14 2 MeritMail Mobile Overview MeritMail Mobile is the MeritMail synchronization program that provides ‘over-the-air’ mobile data access (email, contacts, calendar) to devices using the native software / UI installed on the device. It works with Symbian S60/S80, Windows® Mobile (WM5), and Palm smartphones. Devices listed below can be configured to work with MeritMail Mobile out of the box. Many more devices work with MeritMail Mobile natively but a sync plug-in is not bundled with the device (plug-in is available via a 3rd party - DataViz). You enable MeritMail Mobile in the ZCS COS or for individual Accounts. Users configure the device’s soft- ware for MeritMail Mobile similarly to how they configure the device to sync against Microsoft® Exchange. The following may need to be configured: . Server address. Type the fully qualified hostname of the user’s MeritMail Collaboration Suite mailbox server.
    [Show full text]
  • MICROS Materials Control
    MICROS Materials Control Mobile Solutions 2010 Installation Product Version 8.7.20.36.1421 Document Title: Mobile Solutions 2010 Install Author: Joerg Trommeschlaeger Department: Materials Control Date: 20.09.2012 Version No. of Document: 1.3 Table of Contents INTRODUCTION 3 TERMINOLOGY: .............................................................................. 4 REQUIRED VERSIONS & FILES: ...................................................... 5 SUPPORTED HARDWARE: .............................................................. 7 INSTALLATION: 8 HARDWARE COMMUNICATION: ....................................................... 8 MYMOBILER: ................................................................................. 9 MOBILE SOLUTIONS CLIENT: ......................................................... 11 MOBILE WEB SERVICE: ............................................................... 12 MOBILE SOLUTIONS SETUP: ........................................................ 16 MOBILE DEVICE CONFIGURATION: ............................................... 36 ADVANCED NETWORK FUNCTIONALITY ........................................ 36 THICK CLIENT PREPARATION: ...................................................... 38 MOBILE DEVICE MANAGEMENT: ................................................... 40 MOBILE SOLUTIONS CLIENT: ........................................................ 43 INSTALLING ADDITIONAL DEVICES: ............................................... 45 USING THE MOBILE SOLUTIONS: .................................................. 49 Document
    [Show full text]
  • Orchestrator
    Using the Orchestration Console in System Center 2012 R2 Orchestrator Microsoft Corporation Published: November 1, 2013 Applies To System Center 2012 - Orchestrator Orchestrator in System Center 2012 SP1 System Center 2012 R2 Orchestrator Feedback Send suggestions and comments about this document to [email protected]. Copyright Information This document is provided "as-is". Information and views expressed in this document, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. You may modify this document for your internal, reference purposes. © 2013 Microsoft Corporation. All rights reserved. Microsoft, Access, Active Directory, ActiveSync, ActiveX, Authenticode, Bing, BitLocker, Excel, Forefront, Hyper-V, Internet Explorer, JScript, Microsoft Press, MSDN, Outlook, SharePoint, Silverlight, SoftGrid, SQL Server, Visio, Visual Basic, Visual C++, Visual Studio, Win32, Windows, Windows Intune, Windows Mobile, Windows PowerShell, Windows Server, Windows Server System, and Windows Vista are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners. Revision History Release Date Changes October 17, 2013 Original release of this
    [Show full text]
  • How to Configure Your Mobile Devices Post Migrating to Microsoft Office 365
    How to configure your Mobile Devices post migrating to Microsoft Office 365 1 Contents Purpose ................................................................................................................................... 3 General Settings and logon information .................................................................................. 3 Logging on to Office 365 ...................................................................................................... 3 Outlook Web Access ........................................................................................................ 3 Office 365 IMAP Server Settings ...................................... Error! Bookmark not defined. Document Support Boundaries ................................................................................................ 4 Examples used in this document ............................................................................................. 4 Mobile / Handheld Devices ...................................................................................................... 5 iPad and iPhone (iOS4.x and 5.x) ........................................................................................ 5 iPad and iPhone (iOS6.x) ................................................................................................... 11 Android Setup .................................................................................................................... 16 Android Version 4.0.3 ....................................................................................................
    [Show full text]
  • Connecting Your Windows Mobile Device to Your PC
    Connecting Your Windows Mobile Device to Your PC Users will need to be familiar with the procedures for connecting their Windows Mobile handheld device to the PC for file transfer and software installs/updates. All Windows Mobile handhelds come pre-loaded with connectivity software called ActiveSync. Your desktop PC will also need software which most often is not pre-installed. Newer Windows PC’s use an application called Windows Mobile Device Center (WMDC) to facilitate the connection. This program has replaced ActiveSync which was used on Windows XP and older operating systems. Windows 8 and 10 users will need to enable .NET Framework 3.5 in Control Panel before installing WMDC. Open Control Panel choose Programs and Features > Turn Windows Features On or Off. Expand the section Microsoft .NET Framework 3.5 and check all components as shown here and OK out. Windows Mobile Device Center installers are located on the LandMark Spatial Solutions website (www.landmarkhelp.com ) under Support > Software Downloads > Mobile Device to PC Connection Utilities. Download the appropriate installer (32 or 64 bit) to your PC. If you are unsure which you have you can click Start > right click Computer and choose Properties. The PC specs will be displayed. When installing the WMDC application, right click on the installer named Windows_Mobile_Device_Center_xxbit_Setup.exe and choose Run as Administrator. Next, run the WMDC-Helper utility located on the same webpage as the installers mentioned above. You will be prompted to restart your PC after this is completed. Connecting for the first time with WMDC - The first time connection will take a little longer than usual as some new drivers will be installed.
    [Show full text]
  • Windows Mobile Guide
    Windows Mobile Guide By Karl L. Gechlik askTheAdmin.com This manual is intellectual property of MakeUseOf. It must only be published in its original form. Using parts or republishing altered parts of this guide is prohibited. Windows Mobile Guide Table of Contents Introduction to Windows Mobile and HTC ............................................................................................. 5 1. Phone Features .................................................................................................................................... 7 1.1 Interface ....................................................................................................................................... 7 1.2 File explorer .................................................................................................................................. 8 a) Cut, Copy and Paste ..................................................................................................................... 9 1.3 Phone ............................................................................................................................................ 9 a) Interactive Numbers .................................................................................................................. 10 b) Contacts ..................................................................................................................................... 11 1.4 Clock & Alarms ...........................................................................................................................
    [Show full text]
  • Release Notes Version 1.1.6 of Windows Mobile® 6.1 Operating System for the TK6000 (Carlson Surveyor)
    Release Notes Version 1.1.6 of Windows Mobile® 6.1 Operating System for the TK6000 (Carlson Surveyor) October 2009 These release notes describe important information for Release 1.1.6 of Windows Mobile 6.1 operating systems for Juniper Systems TK6000 ultra-rugged handheld computer. You can download the latest release from the following website: http://www.junipersys.com/support/support.cfm?id=152 Contents These release notes contain the following sections: System Requirements New Features Installation Instructions Important Notes Resolved Issues Known Issues 1 System Requirements This operating system installs on the TK6000 and requires boot loader 4.4 or higher. New Features The following new features are introduced in version 1.1.6 for the TK6000. Added Support for Cell Modem Expansion Pack. This version of the operating system adds support for a cell modem expansion pack on certain TK6000 models (basic models do not support expansion packs). Windows Start key is programmable. The Windows Start key can be programmed for a customized action. Installation Instructions Installation instructions are provided online at the following URL: http://www.ultraruggedfieldpc.com/OSInstallInstructions.pdf Important Notes WiFi connection may be disabled automatically when using ActiveSync® over a USB or serial connection. This can be changed by changing the options in ActiveSync®. Models with integrated WiFi do not support use of a 3rd party WiFi adapter. A TK6000 with integrated WiFi may not operate as expected when a 3rd party WiFi adapter is installed in the device. Clean boot does not erase the /Storage folder. The /Storage folder can be erased by resetting the device and holding the Ctrl-Alt-2 keys until the splash screen appears.
    [Show full text]
  • Econnect User Guide
    eConnect™ User Guide 110 Lake Avenue South, Suite 35 Nesconset, NY 11767 Phone (631) 360-3400 Fax (631) 360-3268 Website: http://www.invisionsoft.com eConnect User Guide Document Information Document Version: Version 1.6 As of: March 31, 2004 Classification: Proprietary Release Date: March 31, 2004 Document ID: eConnectUserGuide.doc ABOUT THIS USER GUIDE This document describes how to install and configure eConnect on handheld terminals with Microsoft® Windows® Pocket PC 2002, Windows Mobile™ 2003 for Pocket PC, and Microsoft® Windows® CE .NET platforms. For specific information on setting up and using connections, refer to the documentation for your terminal. REVISION HISTORY Document Identifier Date Description eConnectUserManual.doc 5/15/2001 Original eConnectUG.doc 10/19/2001 Initial Release, Version 1.0 eConnectUserManual.doc 6/20/2002 Version 1.1 eConnectUserManual.doc 4/03/2003 Version 1.2 eConnectUserGuide.doc 9/23/2003 Version 1.3 eConnectUserGuide.doc 12/8/2003 Version 1.4 eConnectUserGuide.doc 2/6/2004 Version 1.5 eConnectUserGuide.doc 3/2/2004 Version 1.6 NEW IN THIS VERSION • Version 1.6 – Figure 8 updated to show version 3.2.1 display. Small typographical errors corrected. • Version 1.5 - Revised download URL and procedure. • Version 1.4 – Configuration instructions updated. • Version 1.3 – User Guide revised and updated. Version 1.6, 3/31/2004 InVision Software, Inc. - Proprietary i eConnect User Guide Notice Copyright © 2004 InVision Software, Inc. All rights reserved. All rights reserved. This document in full or in part may not be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without the prior written consent of InVision Software, Inc.
    [Show full text]
  • Understanding the Role of Exchange Activesync in Mobile Device Management Maas360.Com > White Paper the Role of EAS in MDM
    MaaS360.com > White Paper Understanding the Role of Exchange ActiveSync in Mobile Device Management MaaS360.com > White Paper The Role of EAS in MDM Understanding ActiveSync’s Role in Table of Contents Mobile Device Management Understanding ActiveSync’s Role in Mobile You can’t understand enterprise mobility without Device Management ................................2 understanding the role of Exchange ActiveSync Understanding ActiveSync Security Policies .....3 (EAS). As EAS has evolved and spread it has become an integral piece of mobility infrastructure, yet Understanding ActiveSync’s Strengths ...........4 many people don’t understand its evolution, its Understanding the Mobile Device strengths and weaknesses, or what is needed to Management Gaps ..................................4 complement EAS in order to meet today’s enterprise ActiveSync Provisioning and Quarantine ........... 4 mobility requirements. This white paper will help Mailbox Policy Management .......................... 5 you understand the appropriate role of Exchange Full and Selective Wipe .............................. 5 ActiveSync in mobile device management at your company. Ready to Move Beyond ActiveSync-based Mobile Device Management? ......................6 Microsoft Exchange is a messaging and collaboration MaaS360 Complements Exchange server technology developed by Microsoft that ActiveSync Mobile Device Management ..........6 provides email, calendar, contact, and task management. ActiveSync is a data synchronization Using MaaS360 with Office 365 ...................... 7 technology and protocol originally released by Microsoft in 1996. Microsoft integrated ActiveSync into Exchange with the release of Exchange 2003. Called Exchange ActiveSync (EAS), the integration of these technologies provided push synchronization of email, calendar, contacts and tasks between an Exchange server and ActiveSync-enabled clients. In October 2005, Microsoft released Exchange 2003 SP2. This release introduced device security policies to ActiveSync.
    [Show full text]
  • Configuring Server Activesync Microsoft Pocket PC PPC 2005
    Configuring Server ActiveSync on Microsoft Pocket PC 2005 There are two ways to enter the necessary configuration settings onto your PDA to enable Server ActiveSync: · From your PC · On the device itself From your PC IMPORTANT: DO NOT connect your Pocket PC to your PC unless you have first installed Microsoft ActiveSync (version 4.1 or later is recommended for Windows Mobile 5 devices). Launch Microsoft ActiveSync from the Start menu. Connect the PDA to your PC via the cradle or USB cable. ActiveSync will detect the new device automatically and launch the Synchronisation Setup Wizard: Click Next. The following window will be displayed: Tick the option to Synchronise directly with a server running Microsoft Exchange Server. Click Next. The following window will be displayed: In the Server address field, enter the name or the IP address of your Exchange server. This needs to be its “fully qualified name” so that it can be accessed from the Internet (eg “exchange.mydomain.net/exchange”) In the Logon Credentials section enter your User name, Password and Domain details as provided by your network administrator. Once all of the details have been entered, click Next. ActiveSync will now attempt to contact the Exchange server to verify the details you have entered. If you do not wish to connect at this time click Skip. The following window will be displayed: Here you can configure which folders are synchronised directly with the Exchange server and which folders are synchronised with Outlook running on your PC. Once you have configured your preferences, click Next. The following window will be displayed: Click Finish.
    [Show full text]